
Microsoft has enabled capabilities in Microsoft 365, Windows, and Azure AD federated applications to allow for strong multi-factor credentials to be provided in the form of either a FIDO2 security key or a PIV-compatible smart card, both of which are supported by the YubiKey.ĭeploying FIDO2 security keys is among the strongest MFA methods available to secure systems and applications. A Cloud Native Organization is uniquely positioned to take advantage of modern capabilities which are outlined in the following sections.Įnable phishing-resistant authentication methods The evidence is clear that the best way to protect the organization is by protecting the user accounts.Įach component or resource in an organization may need to employ its own strategy to enable strong authentication and transition to passwordless. "Over 80% of breaches within Hacking involve Brute force or the Use of lost or stolen

While web applications were highly targeted, the report also states: "2020 Verizon Data Breach Investigations Report.",Verizon, /resources/reports/dbir/. According to Verizon's 2020 Data Breach Investigations Report, web applications are one of the leading Hacking vectors for breaches in almost every industry and vertical. The Cloud Native Organization has a heavy reliance on Web Applications and needs to focus on securing the accounts accessing those web applications.
